Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Arcanna.ai

Security Operations
Using a wide range of out-of-the box integrations, Arcanna.ai continuously learns from existing enterprise cybersecurity experts and scales your team’s capacity to deal with threats. It also provides

BooleBox

Data Loss Prevention
Our data protection company’s mission is to design and develop innovative software dedicated to the total protection of sensitive and confidential corporate information wherever it is, always guarante

Apura Cybersecurity Intelligence

Compliance Consulting
Apura is a Brazilian company that develops advanced products and provides specialized services in information security and cyber defense. We provide open source threat intelligence, managed detection

Hybrid Identity Protection

Security Operations
Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments. With the disappearance of the netw

Offensive Security Manager

Security Operations
Offensive Security Manager is the ultimate AI software that will enforce offensive security automation, orchestration, coverage, ensure quality, and lets you manage whole process. Our mission is to t

ORDR IQ
Security Orchestration Automation and Response
ORDR IQ on SecurityListing: Multi-agent AI orchestrator for IT and security workflow automation

Logpoint SecOps Platform
Security Information and Event Management
Logpoint SecOps Platform on SecurityListing: Integrated SIEM, SOAR, NDR platform with central fleet management capabilities

Zenduty
Security Orchestration Automation and Response
Zenduty on SecurityListing: Zenduty's platform provides real-time operational health monitoring and incident response orchestration to improve incident response times and build a solid on-call culture.

Event Log Explorer
Security Information and Event Management
Event Log Explorer on SecurityListing: Event Log Explorer is a software solution for viewing, analyzing, and monitoring events recorded in Microsoft Windows event logs, offering advanced features and efficient filtering capabilities.

ParrotSec
Offensive Security
ParrotSec on SecurityListing: Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.

Logz.io Distributed Tracing
Security Information and Event Management
Logz.io Distributed Tracing on SecurityListing: Distributed tracing platform for monitoring microservices performance

Netlas
Threat Hunting
Netlas on SecurityListing: Threat intelligence and digital risk protection platform

eShield IT Services

Cloud Security
eShield IT Services is a cybersecurity company based in the United Arab Emirates that provides security, privacy, and regulatory compliance services. It specializes in data protection law, PCI DSS and

44CON

Security Operations
44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional. 44CON is located i

Winbond Electronics

Security Operations
Winbond is a Specialty memory IC company. Product lines include Code Storage Flash Memory, TrustME® Secure Flash, Specialty DRAM and Mobile DRAM. Winbond TrustME® Secure Flash products strengthen rob

Zimperium

Security Operations
Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks. Zimperium is the first and only company to provide a complete mobile security s

ANSecurity

Backup as a Service
ANSecurity is a specialist in securing networks and protecting data that helps some of the largest organisations in the UK and global brands to reduce risk and simplify operational management. ANSecu

SSD TECH

AI Security
SSD TECH is a cybersecurity firm specializing in risk assessment, security architecture, audits, compliance, and governance across enterprises. The company emphasizes reducing risk for organizations b

Performanta Incident Response
Threat Hunting
Performanta Incident Response on SecurityListing: Incident response consulting services for cyber attack containment and recovery

Chainlink

Security Operations
Chainlink expands the capability of smart contracts by enabling access to real-world data and systems without sacrificing the security and reliability guarantees inherent to blockchain technology. Ch